OWASP WEBGOAT: EXPLOIT UNCHECKED EMAIL
- Working with OWASP WebGoat v5.4:
- Going to Parameter Tampering -> Exploit Unchecked Email:
1) Cross Site Scripting
- Since the data in the "Questions or Comments" field is not sanitizied it is easy to inject an (XSS) attack:
- The result is a pop-up window :
- The message has been sent to the user admin:
2) Changing the email recipient
- Sending similar content as in the previous step in the "Questions or Comments" field:
- Intercepting with Tamper Data:
- Starting Tamper:
- Changing the email field from wegboat.admin@gmail.com to friend@gmail.com:
- Clicking Ok:
- The result is successful because now the destination is friend@owasp.org: